Adam Bates
Co-authored papers
2017
-
Transparent Web Service Auditing via Network Provenance Functions
Proceedings of the International World Wide Web Conference
Adam Bates, Wajih Ul Hassan, Kevin Butler, Alin Dobra, Bradley Reaves, Patrick Cable, Thomas Moyer, and Nabil Schear
Network provenance functions trace attacks across distributed web service components with application-layer awareness and no software modifications.
-
Mo(bile) Money, Mo(bile) Problems: Analysis of Branchless Banking Applications in the Developing World
ACM Transactions on Privacy and Security
Bradley Reaves, Jasmine Bowers, Nolen Scaife, Adam Bates, Arnav Bhartiya, Patrick Traynor, and Kevin R.B. Butler
A security analysis of all 46 Android mobile money apps reveals pervasive vulnerabilities and negligible improvement one year after our first study on the topic.
2015
-
Mo(bile) Money, Mo(bile) Problems: Analysis of Branchless Banking Applications in the Developing World
Proceedings of the USENIX Security Symposium
Bradley Reaves, Nolen Scaife, Adam Bates, Patrick Traynor, and Kevin R.B. Butler
The first generation of mobile money applications had pervasive vulnerabilities that allow transaction modification and account impersonation.
-
Boxed Out: Blocking Cellular Interconnect Bypass Fraud at the Network Edge
Proceedings of the USENIX Security Symposium
Bradley Reaves, Ethan Shernan, Adam Bates, Henry Carter, and Patrick Traynor
Audio degradation signatures left by VoIP-to-GSM gateways enable network-edge detection of SIMbox interconnect bypass fraud, which costs operators over $2 billion annually.